Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CCR
2004
94views more  CCR 2004»
11 years 9 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
JSW
2008
164views more  JSW 2008»
11 years 9 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
ISW
2004
Springer
12 years 2 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier
INFOCOM
2007
IEEE
12 years 3 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
ACSAC
2008
IEEE
12 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
books